South Korea is world-famous for its blazing-fast web, near-universal broadband protection, and as a pacesetter in virtual innovation, web hosting world tech manufacturers like Hyundai, LG, and Samsung. However this very good fortune has made the rustic a first-rate goal for hackers and uncovered how fragile its cybersecurity defenses stay.
The rustic is reeling from a string of high-profile hacks, affecting bank card firms, telecoms, tech startups, and authorities businesses, impacting huge swathes of the South Korean inhabitants. In every case, ministries and regulators looked as if it would scramble in parallel, every so often deferring to each other somewhat than shifting in unison.
Critics argue that South Korea’s cyber defenses are hindered by means of a fragmented device of presidency ministries and businesses, steadily leading to gradual and uncoordinated responses, in line with native media reviews.
With no transparent authorities company performing as “first responder” following a cyberattack, the rustic’s cyber defenses are suffering to stay tempo with its virtual ambitions.
“The federal government’s solution to cybersecurity stays in large part reactive, treating it as a disaster control factor somewhat than as essential nationwide infrastructure,” Brian Pak, the executive government of Seoul-based cybersecurity company Theori, informed TechCrunch.
Pak, who additionally serves as an consultant to SK Telecom’s father or mother corporate’s particular committee on cybersecurity inventions, informed TechCrunch that as a result of authorities businesses tasked with cybersecurity paintings in silos, creating virtual defenses and coaching professional employees steadily get lost sight of.
The rustic could also be going through a critical scarcity of professional cybersecurity professionals.
“[That’s] basically since the present way has held again body of workers construction. This loss of skill creates a vicious cycle. With out sufficient experience, it’s unattainable to construct and take care of the proactive defenses had to keep forward of threats,” Pak persisted.
Political impasse has fostered a dependancy of in quest of fast, obtrusive “fast fixes” after every disaster, stated Pak, the entire whilst the tougher, long-term paintings of establishing virtual resilience remains to be sidelined.
This 12 months by myself, there was a big cybersecurity incident in South Korea virtually each month, additional mounting considerations over the resilience of South Korea’s virtual infrastructure.
January 2025
- GS Retail, the operator of comfort retail outlets and grocery markets throughout South Korea, showed a knowledge breach that revealed the non-public main points of about 90,000 shoppers after its web site used to be attacked between December 27 and January 4. The stolen knowledge incorporated names, beginning dates, touch main points, addresses, and electronic mail addresses.
February 2025
April and Might 2025
- South Korea’s part-time process platform Albamon used to be hit by means of a hacking assault on April 30. The breach uncovered the resumes of greater than 20,000 customers, together with names, telephone numbers, and electronic mail addresses.
- In April, South Korea’s telecom massive SK Telecom used to be hit by means of a big cyberattack. Hackers stole the non-public information of about 23 million shoppers — just about part the rustic’s inhabitants. A lot of the aftermath of the cyberattack lasted via Might, through which thousands and thousands of shoppers have been introduced a brand new SIM card following the breach.
June 2025
- Yes24, South Korea’s on-line ticketing and retail platform, used to be hit by means of a ransomware assault on June 9, which knocked its products and services offline. The disruption lasted for approximately 4 days, with the corporate again on-line by means of mid-June.
July 2025
- In July, the North Korea-linked Kimsuky workforce introduced a cyberattack on South Korean organizations, together with a defense-related establishment, this time the use of AI-generated deepfake pictures.
- A North Korea-backed hacking workforce, Kimsuky, used AI-generated deepfake pictures in a July spear-phishing try towards a South Korean army group, in line with Genians Safety Heart. The gang has additionally focused different South Korean establishments.
- Seoul Ensure Insurance coverage (SGI), a Korean monetary establishment, used to be hit by means of a ransomware assault round July 14, which disrupted its core methods. The incident knocked key products and services offline, together with the issuing and verification of promises, leaving shoppers in limbo.
August 2025
- Yes24 confronted a 2d ransomware assault in August 2025, which took its web site and products and services offline for a couple of hours.
- Hackers broke into South Korean monetary products and services corporate Lotte Card, which problems credit score and debit playing cards, between July 22 and August. The breach uncovered round 200GB of knowledge and is thought to have affected more or less 3 million shoppers. The breach remained disregarded for roughly 17 days, till the corporate came upon it on August 31.
- Welcome Monetary: In August 2025, Welrix F&I, a lending arm of Welcome Monetary Staff, used to be hit by means of a ransomware assault. A Russian-linked hacking workforce claimed it stole over a terabyte of interior recordsdata, together with delicate buyer information, or even leaked samples at the darkish internet.
- North Korea-linked hackers, believed to be the Kimsuky workforce, were spying on international embassies in South Korea for months by means of disguising their assaults as regimen diplomatic emails. In keeping with Trellix, the marketing campaign has been lively since March and has focused a minimum of 19 embassies and international ministries in South Korea.
September 2025
- KT, considered one of South Korea’s greatest telecom operators, has reported a cyber breach that revealed subscriber information from greater than 5,500 shoppers. The assault used to be connected to unlawful “pretend base stations” that tapped into KT’s community, enabling hackers to intercept cell visitors, scouse borrow knowledge like IMSI, IMEI, and contact numbers, or even make unauthorized micro-payments.
In gentle of the hot surge in hacking incidents, the South Korean Presidential Workplace’s Nationwide Safety is stepping in to tighten defenses, pushing for a cross-ministerial effort that brings more than one businesses in combination in a coordinated, whole-of-government reaction.
In September 2025, the Nationwide Safety Workplace introduced that it will put in force “complete” cyber measures via an interagency plan, led by means of the South Korean president’s administrative center. Regulators additionally signaled a criminal exchange giving the federal government energy to release probes on the first signal of hacking — although firms haven’t filed a record. Each steps intention to handle the loss of a primary responder that has lengthy hindered South Korea’s cyber defenses.
However South Korea’s fragmented device leaves responsibility vulnerable, striking all authority in a presidential “keep an eye on tower” may possibility “politicization” and overreach, in line with Pak.
A greater trail is also stability: a central frame to set technique and coordinate crises, paired with unbiased oversight to stay energy in take a look at. In a hybrid style, knowledgeable businesses like KISA would nonetheless take care of the technical paintings — simply with easier regulations and responsibility, Pak informed TechCrunch.
When reached for remark, a spokesperson for the South Korea’s Ministry of Science in ICT stated the ministry, with KISA and different related businesses, is “dedicated to addressing more and more subtle and complex cyber threats.”
“We proceed to paintings diligently to reduce possible hurt to Korean companies and most people,” the spokesperson added.
This newsletter used to be in the beginning printed on September 30.

